Question: flag _ 1 : Finding this flag is imperative to moving on quickly, as it contains the passwords from users before they were hacked. Luckily,

flag_1:
Finding this flag is imperative to moving on quickly, as it contains the passwords from users before they were hacked. Luckily, it doesn't have a great hiding spot.
flag_2:
A famous hacker had created a user on the system a year ago. Find this user, crack his password, and login to his account.
flag_3:
Find a log file related to the hacker's name and a zip file with additional info.
Use a compound command to figure out the unique count of IP addresses in this log file. That number is a password.
Hint: Use the unzip command to open any zip files you may find.
Note: To unzip the zip file, use the unzip command.
flag_4:
Find a directory with a list of hackers. Look for a file that has read permissions for the owner, no permissions for groups, and executable only for everyone else.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!